Intrusion Detection

Intrusion Detection news, information, and how-to advice

A mug with the words GitHub Social Coding
honey pot

threat intelligence secrets sharing

5 steps to make threat intelligence work for you

Determining your top threats is not rocket science -- and the effort will pay off in successful mitigations

Inspecting a tablet magnifying glass businessman

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

arithmetic math graffiti

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor?

Police break up cybergang that stole over $15 million from banks

Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

nac 1

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use

securiy companies watch

10 security startups to watch in 2015

With IT spending on security on the increase, here are 10 security newcomers hoping to be worthy of corporate customers

Magnifying loupe on the laptop keyboard    147860345

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

serverskulls header

'Spike' toolkit seeks routers, Internet of things for DDoS botnet

Security researchers have recently discovered a toolkit capable of infecting computers, routers and Internet of Things devices to launch large-scale simultaneous DDoS attacks.

Hackers exploit critical vulnerability in popular WordPress theme component

WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said

Data shows Home Depot breach could be largest ever

The breach occurred at nearly all of Home Depot's 2200 U.S. stores

Load More